Bibliography 1. - link.springer.com978-3-662-04773-6/1.pdf · ... Corrected 5th Print ......

20
Bibliography 1. L. M. Adleman, "A Subexponential Algorithmic for the Discrete Logarithm Problem with Applications to Cryptography", Proceedings of the 20th Annual IEEE Symposium on Foundations of Computer Science, IEEE Press, 1979, 55- 60. 2. L. M. Adleman, "Algorithmic Number Theory- The Complexity Contribution", Proceedings of the 35th Annual IEEE Symposium on Foundations of Computer Science, IEEE Press, 1994, 88-113. 3. L. M. Adleman, C. Pomerance, and R. S. Rumely, "On Distinguishing Prime Numbers from Composite Numbers", Annals of Mathematics, 117 (1983), 173- 206. 4. L. M. Adleman and M. D. A. Huang, Primality Testing and Abelian Varieties over Finite Fields, Lecture Notes in Mathematics 1512, Springer-Verlag, 1992. 5. A. V. Aho, J. E. Hopcroft and J. D. Ullman, The Design and Analysis of Computer Algorithms, Addison-Wesley, 1974. 6. W. Alford, G. Granville and C. Pomerance, "There Are Infinitely Many Carmichael Numbers", Annals of Mathematics, 140 (1994), 703-722. 7. R. Alter, "Computations and Generalizations of a Remark of Ramanujan", Analytic Number Theory, Proceedings, Lecture Notes in Mathematics 899, Springer- Verlag, 1981, 183-196. 8. J. A. Anderson and J. M. Bell, Number Theory with Applications, Prentice- Hall, 1997. 9. R. Anderson (editor), Information Hiding, First International Workshop, Pro- ceedings, Lecture Notes in Computer Science 1174, Springer-Verlag, 1996. 10. G. E. Andrews, Number Theory, W. B. Sayders Company, 1971. Also Dover Publications, 1994. 11. T. M. Apostol, Introduction to Analytic Number Theory, Corrected 5th Print- ing, Undergraduate Texts in Mathematics, Springer-Verlag, 1998. 12. A. 0. L. Atkin and F. Morain, "Elliptic Curves and Primality Proving", Math- ematics of Computation, 61 (1993), 29-68. 13. D. Aucsmith (editor), Information Hiding, Second International Workshop, Proceedings, Lecture Notes in Computer Science 1525, Springer-Verlag, 1998. 14. E. Bach, M. Giesbrecht and J. Mcinnes, The Complexity of Number Theoret- ical Algorithms, Technical Report 247/91, Department of Computer Science, University of Toronto, 1991. 15. E. Bach, G. Miller and J. Shallit, "Sums of Divisors, Perfect Numbers and Factoring", SIAM Journal on Computing, 15 (1989), 1143-1154.

Transcript of Bibliography 1. - link.springer.com978-3-662-04773-6/1.pdf · ... Corrected 5th Print ......

Bibliography

1. L. M. Adleman, "A Subexponential Algorithmic for the Discrete Logarithm Problem with Applications to Cryptography", Proceedings of the 20th Annual IEEE Symposium on Foundations of Computer Science, IEEE Press, 1979, 55-60.

2. L. M. Adleman, "Algorithmic Number Theory- The Complexity Contribution", Proceedings of the 35th Annual IEEE Symposium on Foundations of Computer Science, IEEE Press, 1994, 88-113.

3. L. M. Adleman, C. Pomerance, and R. S. Rumely, "On Distinguishing Prime Numbers from Composite Numbers", Annals of Mathematics, 117 (1983), 173-206.

4. L. M. Adleman and M. D. A. Huang, Primality Testing and Abelian Varieties over Finite Fields, Lecture Notes in Mathematics 1512, Springer-Verlag, 1992.

5. A. V. Aho, J. E. Hopcroft and J. D. Ullman, The Design and Analysis of Computer Algorithms, Addison-Wesley, 1974.

6. W. Alford, G. Granville and C. Pomerance, "There Are Infinitely Many Carmichael Numbers", Annals of Mathematics, 140 (1994), 703-722.

7. R. Alter, "Computations and Generalizations of a Remark of Ramanujan", Analytic Number Theory, Proceedings, Lecture Notes in Mathematics 899, Springer-Verlag, 1981, 183-196.

8. J. A. Anderson and J. M. Bell, Number Theory with Applications, Prentice­Hall, 1997.

9. R. Anderson (editor), Information Hiding, First International Workshop, Pro­ceedings, Lecture Notes in Computer Science 1174, Springer-Verlag, 1996.

10. G. E. Andrews, Number Theory, W. B. Sayders Company, 1971. Also Dover Publications, 1994.

11. T. M. Apostol, Introduction to Analytic Number Theory, Corrected 5th Print­ing, Undergraduate Texts in Mathematics, Springer-Verlag, 1998.

12. A. 0. L. Atkin and F. Morain, "Elliptic Curves and Primality Proving", Math­ematics of Computation, 61 (1993), 29-68.

13. D. Aucsmith (editor), Information Hiding, Second International Workshop, Proceedings, Lecture Notes in Computer Science 1525, Springer-Verlag, 1998.

14. E. Bach, M. Giesbrecht and J. Mcinnes, The Complexity of Number Theoret­ical Algorithms, Technical Report 247/91, Department of Computer Science, University of Toronto, 1991.

15. E. Bach, G. Miller and J. Shallit, "Sums of Divisors, Perfect Numbers and Factoring", SIAM Journal on Computing, 15 (1989), 1143-1154.

416 Bibliography

16. E. Bach and J. Shallit, Algorithmic Number Theory I Efficient Algoritluns, MIT Press, 1996.

17. A. Backer, A Concise Introduction to the Tlwory of Numbers, Cambridge Uni­versity Press, 1984.

18. R. J. Baillie and S. S. Wagstaff, Jr., "Lucas Pseudoprimes", Mathematics of Computation, 35 (1980), 1391 1417.

19. S. Battiato and W. Borha, "Breeding Amicable Kumbers in Abundance II", Mathematics of Computation, 70 (2001), 1329-1333.

20. F. L. Bauer, Decrypted Secrets - l'vfethods and Maxims of Cryptology, 2nd Edition, Springer-Verlag, 2000.

21. B. Beckett, Introduction to Cryptology and PC Security, .McGraw-Hill, 1997. 22. M. Bellare and P. Gogaway, "Optimal Asymmetric Encryption", Advances in

Cryptography, CRYPT() '94, Proceedings, Lecture Notes in Computer Science 950, Springer-Verlag, 1995, 92 111.

23. P. Benioff, "The Computer as a Physical System - A Microscopic Quantum Mechanical Hamiltonian .Model of Computers as Represented by Turing Ma­chines", Journal of Statistical Physics, 22 (1980), 563-591.

24. C. H. Bennett, "Quantum Information and Computation", Physics Today, Oc­tober 1995, 24-30.

25. C. H. Bennett, G. Brassard and A. K. Ekert, "Quantum Cryptography", Sci­entific American, October 1992, 26· 33.

26. C. H. Bennett, "Strengths and Weakness of Quantum Computing", SIAM Jour­nal on Computing, 26 (5)1997, 1510 1523.

27. E. Bernstein and L. Vazirani, "Quantum Complexity Theory", SIAM Journal on Computing, 26 5(1997), 1411-1473.

28. M. Blum and S. Goldwasser, "An Efficient Probabilistic Public-key Encryp­tion Scheme that Hides all Partial Information" , Advances in Cryptography, CRYPT() '84, Proceedings, Lecture Kates in Computer Science 196, Springer­Verlag, 1985, 289-302. Boll:1986 B. Bollobas (editor), Littlewood's Miscellany, Cambridge University Press, 1986.

29. E. Bornbieri, Problems of the Millennium: Tile Riemann Hypothesis, Institute for Advanced Study, Princeton, 2000.

30. D. Boneh, "Twenty Years of Attacks on the RSA Cryptosystem", Notices of the AMS, 46 2(1999), 203 213.

31. \V. Borha, "tber die Fixpunkte der k-fach iterierten Teilersummenfunktion", Mitt. Math. Gesellsch. Hamburg, 9 5(1969), 34 48.

32. W. Borho and H. Hoffmann, "Breeding Amicable Kumbers in Abundance", Mathematics of Computation, 46 (1986), 281-293.

33. G. Brassard, "A Quantum Jump in Computer Science", Computer Science Today Recent Trends and Development, Lecture Kotes in Computer Science 1000, Springer-Verlag, 1995, 1 14.

34. R. P. Brent, "Irregularities in the Distribution of Primes and Twin Primes", }\iatllematics of Computation, 29 (1975), 43-56.

35. R. P. Brent, "An Improved Monte Carlo Factorization Algorithm", BIT, 20 (1980), 176 184.

Bibliography 417

36. R. P. Brent, "Some Integer Factorization Algorithms using Elliptic Curves", Australian Computer Science Communications, 8 (1986), 149-163.

37. R. P. Brent, "Primality Testing and Integer Factorization", Proceedings of Aus­tralian Academy of Science Annual General Meeting Symposium on the Role of Mathematics in Science, Canberra, 1991, 14-26.

38. R. P. Brent, "Uses of Randomness in Computation", Report TR-CS-94-06, Computer Sciences Laboratory, Australian National University, 1994.

39. R. P. Brent, G. L. Cohen and H. J. J. te Riele, "Improved Techniques for Lower Bounds for Odd Perfect Numbers", Mathematics of Computation, 57 (1991), 857-868.

40. D. M. Bressoud, Factorization and Primality Testing, Undergraduate Texts in Mathematics, Springer-Verlag, 1989.

41. E. F. Brickell, D. M. Gordon and K. S. McCurley, "Fast Exponentiation with Precomputation" (Extended Abstract), Advances in Cryptography, EURO­CRYPT '92, Proceedings, Lecture Notes in Computer Science 658, Springer­Verlag, 1992, 200-207.

42. W. Buchanan, Mastering the Internet, Macmillan, 1997.

43. J. P. Buhler (editor), Algorithmic Number Theory, Third International Sym­posium, ANTS-III, Proceedings, Lecture Notes in Computer Science 1423, Springer-Verlag, 1998.

44. S. A. Burr (editor), The Unreasonable Effectiveness of Number Theory, Pro­ceedings of Symposia in Applied Mathematics 46, American Mathematical So­ciety, 1992.

45. CACM, "The Digital Signature Standard Proposed by NIST and Responses to NIST's Proposal", Communications of the ACM, 35, 7(1992), 36-54.

46. J. R. Chen, "On the Representation of a Large Even Integer as the Sum of a Prime and the Product of at most Two Primes", Scientia Sinica, XVI, 2(1973), 157-176.

47. K. Chen, "Authenticated Encryption Scheme Based on Quadratic Residue", Electronics Letters, 34, 22(1998), 2115-2116.

48. S. S. Chern, "Mathematics in the 21st Century", Advances in Mathematics (China), 21, 4(1992), 385-387.

49. L. Childs, A Concrete Introduction to Higher Algebra, Undergraduate Texts in Mathematics, Springer-Verlag, 1979.

50. H. Cohen, A Course in Computational Algebraic Number Theory, Graduate Texts in Mathematics 138, Springer-Verlag, 1993.

51. J. H. Conway and R. K. Guy, The Book of Numbers, Springer-Verlag, 1996. 52. S. Cook, The P versus NP Problem, University of Toronto, April, 2000.

(Manuscript prepared for the Clay Mathematics Institute for the Millennium Prize Problems; revised in November 2000.)

53. J. W. Cooley and J. W. Tukey, "An Algorithm for the Machine Calculation of Complex Fourier Series", Mathematics of Computation, 19 (1965), 297-301.

54. T. H. Carmen, C. E. Ceiserson and R. L. Rivest, Introduction to Algorithms, MIT Press, 1990.

55. R. Crandall, J. Doenias, C. Norrie and J. Young, "The Twenty-Second Fermat Number is Composite", Mathematics of Computation, 64 (1995), 863-869.

56. R. Crandall and C. Pomerance, Prime Numbers - A Computational Perspec­tive, Springer-Verlag, 2001.

418 Bibliography ------

57. I. Damgiird (editor), Lectures in Data Security, Lecture Notes in Computer Science 1561, Springer-Verlag, 1999.

58. H. Davenport, The Higher Arithmetic, 7th Edition, Cambridge University Press, 1999.

59. M. Delcglise and .J. Rivat, "Computing 1r(x) - the Meisscl, Lehmer, Lagarias, Miller, Odlyzko Method", Mathematics of Computation, 65 (1996), 235 245.

60. D. C. Denson, The Moment of Proof lvlatlwmatical Epiphanies, Oxford Uni­versity Press, 1997.

61. .J. ::\1. Deshouillers, G. Effinger, H . .J . .J. te Riele and D. Zinoviev, "A Complete Vinogradov 3-Prime Theorem under the Riemann Hypothesis", Electronic Re­search Announcements of the AMS, 3 (1997), 99-104.

62 . .J. :vr. Deshouillers, H . .J . .J. te Ricle andY. Saouter, ;'-lew Experimental Results Concerning the Goldbach Conjecture, Technical Report l\IAS-R9804, Centre for :VIathernatics and Computer Science (CWI), Amsterdam, 1998.

63. D. Deutsch, "Quantum Theory, the Church Turing Principle and the Universal Quantum Computer", Proceedings of the Royal Society of London, Series A, 400 (1985), 96 117.

64. K. Devlin, Afatlwmatics: The Science of Patterns, Scientific American Library, 1997.

65. L. E. Dickson, History of the Theory of ;'-/umbers I- Divisibility and Primality, G. E. Stechcrt & Co., ::\ew York, 1934.

66. W. Diffie and E. Hellman, "New Directions in Cryptography", IEEE Transac­tions on Information Theory, 22, 5(1976), 644 654.

67. W. Diffie and E. Hellman, "Privacy and Authentication: An Introduction to Cryptography", Proceedings of the IEEE, 67, 3(1979), 393 427.

68. P. G. L. Dirichlet, Lecturers on Number Theory, Supplements by R. Dedekind, American }'.Iathematics Society and London Mathematics Society, 1999.

69. T. ElGamal, "A Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithms", IEEE Transactions on Information Theory, 31 (1985), 496 472.

70. G. Ellis, Rings and Fields, Oxford University Press, 1992.

71. S. S. Epp, Discrete 1vlathematics with Applications, 2nd Edition, P\,YS Pub­lishing Company, Boston, 1995.

72. Euclid, The Thirteen Books of Euclid's Elements, Translated by T. L. Heath, Great Books of the Western World 11, edited by R. M. Hutchins, William Benton Publishers, 1952.

73. Euclid, The Thirteen Books of Euclid's Elements, Second Edition, Translated by Thomas L. Heath, Dover Publications, 1956.

74. R. P. Feynrnan, "Simulating Physics with Computers", International Journal of Theoretical Physics, 21 (1982), 467 488.

75. R. P. Feymnan, Feynman Lectures on Computation, Edited by A . .J. G. Hey and R. \V. Allen, Addison-Wesley, 1996.

76 .. J. B. Fraleigh, A First Course in Abstract Algebra, 5th Edition, Addison­Wesley, 1994.

77 . .J. A. Gallian, "Error Detection Methods", ACM Computing Surveys, 28, 3(1996), 503-517.

Bibliography 419

78. M. Gardner, "Mathematical Games- A New Kind of Cipher that Would Take Millions of Years to Break", Scientific American, 237, 2(1977), 120-124.

79. M. R. Garey and D. S. Johnson, Computers and Intractability - A Guide to the Theory of NP-Completeness, W. H. Freeman and Company, 1979.

80. S. Garfinkel, Web Security and Commerce, O'Reilly, 1997.

81. P. Garrett, Making, Breaking Codes: An Introduction to Cryptology, Prentice­Hall, 2001.

82. C. F. Gauss, Disquisitiones Arithmeticae, G. Fleischer, Leipzig, 1801. English translation by A. A. Clarke, Yale University Press, 1966. Revised English trans­lation by W. C. Waterhouse, Springer-Verlag, 1975.

83. P. Giblin, Primes and Programming- An Introduction to Number Theory with Computing, Cambridge University Press, 1993.

84. S. Goldwasser, "The Search for Provably Secure Cryptosystems", Cryptology and Computational Number Theory, edited by C. Pomerance, Proceedings of Symposia in Applied Mathematics 42, American Mathematical Society, 1990.

85. S. Goldwasser and J. Kilian, "Almost All Primes Can be Quickly Certified", Proceedings of the 18th ACM Symposium on Theory of Computing, Berkeley, 1986, 316-329.

86. S. Goldwasser and J. Kilian, "Primality Testing Using Elliptic Curves", Journal of ACM, 46, 4(1999), 450-472.

87. M. T. Goodrich and R. Tamassia, Algorithm Design: Foundations, Analysis, and Internet Examples, John Wiley & Sons, 2001.

88. S. Goldwasser and S. Micali, "Probabilistic Encryption", Journal of Computer and System Sciences, 28 (1984), 270-299.

89. D. M. Gordon and K. S. McCurley, "Massively Parallel Computation of Dis­crete Logarithms", Advances in Cryptography, Crypto '92, Proceedings, Lec­ture Notes in Computer Science 740, Springer-Verlag, 1992, 312-323.

90. D. M. Gordon, "Discrete Logarithms in GF(p) using the Number Field Sieve", SIAM Journal on Discrete Mathematics, 6, 1(1993), 124-138.

91. F. T. Grampp and R. H. Morris, "UNIX Operating System Security", AT&T Bell Laboratories Technical Journal, 63 (1984), 1649-1672.

92. A. Granville, J. van de Lune and H. J. J. te Riele, "Checking the Goldbach Conjecture on a Vector Computer", Number Theory and Applications, edited by R. A. Mollin, Kluwer Academic Publishers, 1989, 423-433.

93. D. Gries and. F. B. Schneider, A Logical Approach to Discrete Math, Texts and Monographs in Computer Science, Springer-Verlag, 1993.

94. R. K. Guy, Unsolved Problems in Number Theory, 2nd Edition, Springer­Verlag, 1994.

95. D. Guedj, Numbers- The Universal Language, Thames and Hudson, 1997.

96. F. Guterl, "Suddenly, Number Theory Makes Sense to Industry", International Business Week, 20 June 1994, pp. 62-64.

97. H. Halberstam and H. E. Richert, Sieve Methods, Academic Press, 1974.

98. G. H. Hardy, A Mathematician's Apology, Cambridge University Press, 1979.

99. G. H. Hardy and J. E. Littlewood, "Some Problems of 'Partitio Numerorum', III: On the Express of a Number as a Sum of Primes", Acta Mathematica, 44 (1923), 1-70.

420 Bibliography

100. G. H. Hardy and E. M. Wright, An Introduction to Theory of Numbers, 5th Edition, Oxford University Press, 1979.

101. D. R. Heath-Brown, "Odd Perfect Numbers", Mathematical Proceedings of Cambridge Philosophy Society, 115, 1(1994), 191-196.

102. A. Heck, Introduction to Maple, 2nd Edition, Springer-Verlag, 1996. 103. I. N. Herstein, Topics in Algebra, 2nd Edition, Wiley, 1975. 104. R. Hill, A First Course in Coding Theory, Oxford University Press, 1991. 105. L. Hua, Introduction to Number Theory, English Translation from Chinese

by P. Shiu, Springer-Verlag, 1980. 106. R. J. Hughes, "Cryptography, Quantum Computation and Trapped Ions",

Philosophic 'ITansactions of the Royal Society London, Series A, 356 (1998), 1853-1868.

107. R. M. Huizing, An Implementation of the Number Field Sieve, Note NM­R9511, Centre for Mathematics and Computer Science (CWI), Amsterdam, 1995.

108. T. W. Hungerford, Abstract Algebra - An Introduction, Saunders College Publishing, 1990.

109. D. Husemoller, Elliptic Curves, Graduate Texts in Mathematics 111, Springer­Verlag, 1987.

110. H. Inamori, A Minimal Introduction to Quantum Key Distribution, Centre for Quantum Computation, Clarendon Laboratory, Oxford University, 1999.

111. K. Ireland and M. Rosen, A Classical Introduction to Modern Number Theory, 2nd Edition, Graduate Texts in Mathematics 84, Springer-Verlag, 1990.

112. T. H. Jackson, From Number Theory to Secret Codes, A Computer Illustrated Text, Adam Hilger, Bristol, 1987.

113. G. Jaeschke, "Reciprocal Hashing: A Method for Generating Minimal Perfect Hashing Functions", Communications of the ACM, 24, 12(1981), 829-833.

114. D. S. Johnson, "A Catalog of Complexity Classes", Handbook of Theoretical Computer Science, edited by J. van Leeuwen, MIT Press, 1990, 69-161.

115. R. Jozsa, "Quantum Factoring, Discrete Logarithms, and the Hidden Sub­group Problem", Computing in Science and Engineering, March/ April 2001, 34-43.

116. B. S. Kaliski, "A Pseudo-Random Bit Generator Based on Elliptic Curve Logarithms", Advances in Cryptography, CRYPTO '86, Proceedings, Lecture Notes in Computer Science 263, Springer-Verlag, 1986, 84-103.

117. D. Kahn, The Codebreakers, Macmillan, 1967. 118. C. Kaufman, R. Perlman and M. Speciner, Network Security- Private Com­

munication in a Public World, Prentice-Hall, 1995. 119. A. Ya. Khinchin, Continued Fractions, English translation from Russian,

Chicago University Press, 1964. 120. J. Kilian, Uses of Randomness in Algorithms and Protocols, MIT Press, 1990.

121. D. E. Knuth, "Computer Science and its Relation to Mathematics", American Mathematical Monthly, 81, 4(1974), 323-343.

122. D. E. Knuth, The Art of Computer Programming I- Fundamental Algorithms, 3rd Edition, Addison-Wesley, 1997. ·

123. D. E. Knuth, The Art of Computer Programming II- Seminumerical Algo­rithms, 3rd Edition, Addison-Wesley, 1998.

Bibliography 421

124. D. E. Knuth, The Art of Computer Programming III- Sorting and Searching, 2nd Edition, Addison-Wesley, 1998.

125. C. Ko and Q. Sun, Lecture Notes in Number Theory (In Chinese), Higher Education Press, Beijing, 1984.

126. N. Koblitz, "Elliptic Curve Cryptography", Mathematics of Computation, 48 (1987), 203-209.

127. N. Koblitz, Introduction to Elliptic Curves and Modular Forms, 2nd Edition, Graduate Texts in Mathematics 97, Springer-Verlag, 1993.

128. N. Koblitz, A Course in Number Theory and Cryptography, 2nd Edition, Graduate Texts in Mathematics 114, Springer-Verlag, 1994.

129. N. Koblitz, Algebraic Aspects of Cryptography, Algorithms and Computation in Mathematics 3, Springer-Verlag, 1998.

130. N. Koblitz, Cryptography, in: Mathematics Unlimited- 2001 and Be­yond, Edited by B. Enguist and W. Schmid, Springer-Verlag, 2001, 749-769.

131. S. Konyagin and C. Pomerance, "On Primes Recognizable in Deterministic Polynomial Time", The Mathematics of Paul Erdos, edited by R. L. Graham and J. Nesetril, Algorithms and Combinatorics 13, Springer-Verlag, 1997, 176-198.

132. I. Koren, Computer Arithmetic Algorithms, Prentice-Hall, 1993.

133. H. Krishna, B. Krishna, K. Y. Lin, and J. D. Sun, Computational Number Theory and Digital Signal Processing, CRC Press, 1994.

134. E. Kranakis, Primality and Cryptography, John Wiley & Sons, 1986. 135. R. Kumanduri and C. Ronero, Number Theory with Computer Applications,

Prentice-Hall, 1998. 136. J. C. Lagarias, "Pseudorandom Number Generators", Cryptology and Com­

putational Number Theory, edited by C. Pomerance, Proceedings of Symposia in Applied Mathematics 42, American Mathematical Society, 1990, pp 115-143.

137. S. Lang, Elliptic Functions, 2nd Edition, Springer-Verlag, 1987.

138. J. van Leeuwen (editor), Handbook of Theoretical Computer Science, MIT Press, 1990.

139. R. S. Lehman, "Factoring Large Integers", Mathematics of Computation, 28 (1974), pp 637-646.

140. H. W. Lenstra, Jr., "Factoring Integers with Elliptic Curves", Annals of Math­ematics, 126 (1987), 649-673.

141. A. K. Lenstra and H. W. Lenstra, Jr., The Development of the Number Field Sieve, Lecture Notes in Mathematics 1554, Springer-Verlag, 1993.

142. H. R. Lewis and C. H. Papadimitriou, Elements of the Theory of Computation, 2nd Edition, Prentice-Hall, 1998.

143. P. Linz, An Introduction to Formal Languages and Automata, 2nd Edition, Jones and Bartlett Publishers, 1997.

144. J. E. Littlewood, A Mathematician's Miscellany, Methuen & Co. Ltd. London, 1953. (This book later became Littlewood's Miscellany, edited by B. Bollobas and published by Cambridge University Press in 1986.)

145. C L. Liu, Introduction to Combinatorial Mathematics, McGraw-Hill, 1968.

146. H. K. Lo, "Quantum Cryptography", Introduction to Quantum Computation and Information, edited by H. K. Lo, S. Popescu and T. Spiller, World Scientific, 1998, 76-119.

422 Bibliography

147. J. van de Lune, H. J. J. te Riele and D. T. Winter, "On the Zeros of the Riemann Zata Function in the Critical Strip IV", Mathematics of Computation, 46 (1986), 667-681.

148. R. S. Macgregor, A. Aresi and A. Siegert, WWW.Security - How to Build a Secure World Wide Web Connection, Prentice-Hall, 1996.

149. J. H. McClellan and C. M. Radar, Number Theory in Digital Signal Process­ing, Prentice-Hall, 1979.

150. K. S. McCurley, "The Discrete Logarithm Problem", Cryptology and Com­putational Number Theory, edited by C. Pomerance, Proceedings of Symposia

... in.Applied Mathematics 42, American Mathematics Society, 1990, pp 49-74.

151. K. S. McCurley, "Odds and Ends from Cryptology and Computational Num­ber Theory", edited by C. Pomerance, Proceedings of Symposia in Applied Mathematics 42, American Mathematics Society, 1990, pp 49-74.

152. R. J. McEliece, Finite Fields for Computer Scientists and Engineers, Kluwer Academic Publishers, 1987.

153. H. McKean and V. Moll, Elliptic Curves- Function Theory, Geometry, Arith­metic, Cambridge University Press, 1997.

154. A. R. Meijer, "Groups, Factoring, and Cryptography" Mathematics Magazine, 69, 2(1996), 103-109.

155. A. J. Menezes, Elliptic Curve Public Key Cryptosystems, Kluwer Academic Publishers, 1993.

156. A. Menezes and S. A. Vanstone, "Elliptic curve cryptosystems and their im­plementation", Journal of Cryptology, 6 (1993), 209-224.

157. A. Menezes, P. C. van Oorschot and S. A. Vanstone, Handbook of Applied Cryptosystems, CRC Press, 1996.

158. R. C. Merkle, "Secure Communications over Insecure Channels" Communica­tions of the ACM, 21 (1978), 294-299. (Submitted in 1975.)

159. J. F. Mestre, "Formules Explicites et Minoration de Conducteurs de Varietes algebriques" Compositio Mathematica, 58 (1986), 209-232.

160. B. Meyer and and V. Miiller, "A Public Key Cryptosystem Based on Elliptic Curves over Z/nZ Equivalent to Factoring", Advances in Cryptology, EURO­CRYPT '96, Proceedings, Lecture Notes in Computer Science 1070, Springer­Verlag, 1996, 49-59.

161. M. Mignotte, "How to Share a Secret", Cryptography, Workshop Proceedings, Lecture Notes in Computer Science 149, Springer-Verlag, 1983, 371-375.

162. G. Miller, "Riemann's Hypothesis and Tests for Primality", Journal of Systems and Computer Science, 13 (1976), 300-317.

163. V. Miller, "Uses of Elliptic Curves in Cryptography", Advances in Cryptology, CRYPTO '85, Proceedings, Lecture Notes in Computer Science 218, Springer­Verlag, 1986, 417-426.

164. R. A. Mollin, Fundamental Number Theory with Applications, CRC Press, 1998.

165. R. A. Mollin, An Introduction to Cryptography, Chapman & Hall/CRC, 2001. 166. P. L. Montgomery, "Speeding Pollard's and Elliptic Curve Methods of Fac­

torization", Mathematics of Computation, 48 (1987), 243-264.

167. P. L. Montgomery, "A Survey of Modern Integer Factorization Algorithms", CWI Quarterly, 7, 4(1994), 337-394.

Bibliography 423

168. F. Morain, Courbes Elliptiques et Tests de Primalite, Universite Claude Bernard, Lyon I, 1990.

169. M. A. Morrison and J. Brillhart, "A Method of Factoring and the Factorization of F7'', Mathematics of Computation, 29 (1975), 183-205.

170. R. Motwani and P. Raghavan, Randomized Algorithms, Cambridge University Press, 1995.

171. C. J. Mozzochi, "A Simple Proof of the Chinese Remainder Theorem", Amer­ican Mathematical Monthly, 74 (1967), 998.

172. M. B. Nathanson, Elementary Methods in Number Theory, Springer-Verlag, 2000.

173. NIST, "Data Encryption Standard", Federal Information Processing Stan­dards Publication 46-3, National Institute of Standards and Technology, U.S. Department of Commerce, 1999.

174. I. Niven, H. S. Zuckerman and H. L. Montgomery, An Introduction to the Theory of Numbers, 5th Edition, John Wiley & Sons, 1991.

175. D. H. Nyang and J. S. Song, "Fast Digital Signature Scheme Based on the Quadratic Residue Problem", Electronics Letters, 33, 3(1997), 205-206.

176. S. Pohlig and M. Hellman, "An Improved Algorithm for Computing Loga­rithms over GF(p) and its Cryptographic Significance", IEEE Transactions on Information Theory, 24 (1978), pp 106-110.

177. J. O'Connor and E. Robertson, The MacTutor History of Mathematics Archive, http:/ /www.groups.dcs.st-and.ac. uk/ rvhistory /Mathematicians.

178. A. M. Odlyzko, "Discrete Logarithms in Finite Fields and their Cryptographic Significance", Advances in Cryptography, EUROCRYPT '84, Proceedings, Lec­ture Notes in Computer Science 209, Springer-Verlag, 1984, 225-314.

179. T. Okamoto and K. Ohta, "Universal Electronic Cash", Advances in Cryp­tography, CRYPTO '91, Proceedings, Lecture Notes in Computer Science 576, Springer-Verlag, 1991, 324-337.

180. Open University Course Team, Number Theory, Complex Analysis Unit 15, Open University Press, 1974.

181. 0. Ore, Number Theory and its History, Dover Publications, 1988.

182. C. P. Pfleeger, Security in Computing, Prentice-Hall, 1997. 183. R. G. E. Pinch, "Some Primality Testing Algorithms", Notices of the American

Mathematical Society, 40, 9(1993), 1203-1210.

184. R. G. E. Pinch, Mathematics for Cryptography, Queen's College, University of Cambridge, 1997.

185. R. G. E. Pinch, The Carmichael Numbers up to 1016 , Queen's College, Uni­versity of Cambridge, 1997.

186. S. C. Pohlig and M. Hellman, "An Improved Algorithm for Computing Loga­rithms over GF(p) and its Cryptographic Significance", IEEE Transactions on Information Theory, 24 (1978), 106-110.

187. J. M. Pollard, "A Monte Carlo Method for Factorization", BIT, 15 (1975), 331-332.

188. J. M. Pollard, "Monte Carlo Methods for Index Computation (mod p)", Mathematics of Computation, 32 (1980), 918-924.

189. C. Pomerance, "Very Short Primality Proofs", Mathematics of Computation, 48 (1987), 315-322.

424 Bibliography

190. C. Pomerance (editor), Cryptology and Computational Number Theory, Pro­ceedings of Symposia in Applied Mathematics 42, American Mathematical So­ciety, 1990.

191. C. Pomerance, "Cryptology and Computational Number Theory- An Intro­duction", Cryptology and Computational Number Theory, edited by C. Pomer­ance, Proceedings of Symposia in Applied Mathematics 42, American Mathe­matical Society, 1990, 1-12.

192. C. Pomerance, J. L. Selfridge and S. S. Wagstaff, Jr., "The Pseudoprimes to 25 · 109 ", Mathematics of Computation, 35 (1980), 1003-1026.

193. V. R. Pratt, "Every Prime Has a Succinct Certificate", SIAM Journal on Computing, 4 (1975), 214-220.

194. W. H. Press and Teukolsky et a!., Numerical Recipes in C - The Art of Scientific Computing, 2nd Edition, Cambridge University Press, 1992.

195. M. 0. Rabin, "Probabilistic Algorithms for Testing Primality", Journal of Number Theory, 12 (1980), 128-138.

196. E. D. Reilly and F. D. Federighi, PASCALGORITHMS - A Pascal-Based Introduction to Computer Science, Houghton Miffiin, Boston, 1989.

197. D. Redmond, Number Theory: An Introduction, Marcel Dekker, New York, 1996.

198. P. Ribenboim, The Little Book on Big Primes, Springer-Verlag, 1991.

199. P. Ribenboim, "Selling Primes", Mathematics Magazine, 68, 3(1995), 175-182.

200. P. Ribenboim, The New Book of Prime Number Records, Springer-Verlag, 1996.

201. J. Richstein, "Goldbach's Conjecture up to 4 · 1014 ", Mathematics of Compu­tation, 70, (2001), 1745-1749.

202. E. Rieffel and W. Polak, "An Introduction to Quantum Computing for Non­Physicists", ACM Computing Surveys, 32, 3(2000), 300-335.

203. H. J. J. te Riele, "New Very Large Amicable Pairs", Number Theory, Noord­wijkerhout 1983, Proceedings, Lecture Notes in Mathematics 1068, Springer­Verlag, 1984, 210-215.

204. H. J. J. te Riele, "A New Method for Finding Amicable Numbers", Reprint from Mathematics of Computation 1943-1993, A Half-century of Computational Mathematics, Vancouver, 9-13 August 1993.

205. H. J. J. te Riele, "Factorization of RSA-140 using the Number Field Sieve", http: I lwww. crypto-wor1d. comlannouncementsiRSA140. txt, 4 February 1999.

206. H. J. J. te Riele, "Factorization of a 512-bits RSA Key using the Number Field Sieve", http: I lwww. crypto-world. comlannouncementsiRSA155. txt, 26 August 1999.

207. H. Riesel, Prime Numbers and Computer Methods for Factorization, Birkhauser, Boston, 1990.

208. R. L. Rivest, "Remarks on a Proposed Cryptanalytic Attack on the M.I.T. Public-key Cryptosystem", Cryptologia, 2, 1(1978), 62-65.

209. R. L. Rivest, A. Shamir and L. Adleman, A Method for Obtaining Digital Signatures and Public Key Cryptosystems, Communications of the ACM, 21, 2(1978), 120-126.

Bibliography 425

210. H. E. Rose, A Course in Number Theory, 2nd Edition, Oxford University Press, 1994.

211. K. Rosen, Elementary Number Theory and its Applications, 4th Edition, Addison-Wesley, 2000.

212. J. J. Rotman An Introduction to the Theory of Groups, Springer-Verlag, 1994.

213. A. D. Rubin and D. E. Geer, Jr., Mobile Code Security, IEEE Internet Com­puting, 2, 6(1998), 30-34.

214. G. Rozenberg and A. Salomaa, Cornerstones of Undecidability, Prentice-Hall, 1994.

215. A. Salomaa, Public-Key Cryptography, 2nd Edition, Springer-Verlag, 1996.

216. Y. Saouter, Vinogradov's Theorem is True up to 1020 , Publication Interne No. 977, IRISA, 1995.

217. V. Scarani, "Quantum Computing", American Journal of Physics, 66, 11(1998), 956-960.

218. B. Schneier, Applied Cryptography- Protocols, Algorithms, and Source Code in C, 2nd Edition, John Wiley & Sons, 1996.

219. B. Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall and Niels Ferguson, The Twofish Encryption Algorithm, John Wiley & Sons, 1999.

220. C. P. Schnorr, "Efficient Identification and Signatures for Smart Cards", Ad­vances in Cryptography, CRYPTO '89, Proceedings, Lecture Notes in Computer Science 435, Springer-Verlag, 1990, 239-252.

221. R. Schoof, "Elliptic Curves over Finite Fields and the Computation of Square Roots mod p", Mathematics of Computation, 44 (1985), 483-494.

222. M. R. Schroeder, Number Theory in Science and Communication, 3rd Edition, Springer Series in Information Sciences 7, Springer-Verlag, 1997.

223. W. Schwarz and J. Wolfgang, "Some Remarks on the History of the Prime Number Theorem from 1896 to 1960" Development of Mathematics 1900-1950, edited by J.-P. Pier, Birkhiiuser, 1994.

224. A. Shamir, "Factoring Numbers in O(log n) Arithmetic Steps", Information Processing Letters, 8, 1(1979), 28-31.

225. A. Shamir, "How to Share a Secret", Communications of the ACM, 22, 11(1979), 612-613.

226. P. Shor, "Algorithms for Quantum Computation: Discrete Logarithms and Factoring" , Proceedings of 35th Annual Symposium on Foundations of Com­puter Science, IEEE Computer Society Press, 1994, 124-134.

227. P. Shor, "Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer", SIAM Journal on Computing, 26, 5(1997), 1484-1509.

228. J. H. Silverman and J. Tate, Rational Points on Elliptic Curves, Undergrad­uate Texts in Mathematics, Springer-Verlag, 1992.

229. J. H. Silverman, The Arithmetic of Elliptic Curves, Graduate Texts in Math­ematics 106, Springer-Verlag, 1994.

230. J. H. Silverman, A Friendly Introduction to Number Theory, Second Edition, Prentice-Hall, 2001.

231. J. H. Silverman, "The Xedni Calculus and the Elliptic Curve Discrete Loga­rithm Problem", Dept of Mathematics, Brown University, 10 February 1999.

426 Bibliography

232. J. H. Silverman and J. Suzuki, "Elliptic Curve Discrete Logarithms and the Index Calculus", Advances in Cryptology ASIA CRYPT '98, Springer Lecture Notes in Computer Science 1514, 1998, 110-125.

233. R. D. Silverman, 'The Multiple Polynomial Quadratic Sieve", Mathematics of Computation, 48 (1987), 329-339.

234. R. D. Silverman, "A Perspective on Computational Number Theory", Notices of the American Mathematical Society, 38, 6(1991), 562-568.

235. R. D. Silverman, "Massively Distributed Computing and Factoring Large In­tegers", Communications of the ACM, 34, 11(1991), 95-103.

236. D. R. Simon, "On the Power of Quantum Computation", Proceedings of the 35th Annual IEEE Symposium on Foundations of Computer Science, IEEE Press, 1994, 116-123.

237. S. Singh, The Code Book - The Science of Secrecy from Ancient Egypt to Quantum Cryptography, Fourth Estate, London, 1999.

238. S. Singh, The Science of Secrecy - The Histroy of Codes and Codebreaking, Fourth Estate, London, 2000.

239. M. K. Sinisalo, "Checking the Goldbach Conjecture up to 4 · 1011 ", Mathe­matics of Computation, 61 (1993), 931-934.

240. M. Sipser, Introduction to the Theory of Computation, PWS Publishing Com­pany, Boston, 1997.

241. D. Slowinski, "Searching for the 27th Mersenne Prime", Journal of Recre­ational Mathematics, 11, 4(1978-79), 258-261.

242. R. E. Smith, Internet Cryptography, Kluwer Academic Publishers, 1997.

243. M. A. Soderstrand, W. K. Jenkins, G. A. Jullien and F. J. Taylor, Residue Number System Arithmetic, Modern Applications in Digital Signal Processing, IEEE Press, 1986.

244. R. Solovay and V. Strassen, "A Fast Monte-Carlo Test for Primality", SIAM Journal on Computing, 6, 1(1977), 84-85. "Erratum: A Fast Monte-Carlo Test for Primality", SIAM Journal on Computing, 7, 1(1978), 118.

245. I. Stewart, "Geometry Finds Factor Faster", Nature, 325, 15 January 1987, 199.

246. D. R. Stinson, Cryptography: Theory and Practice, CRC Press, 1995. 247. N. S. Szabo and R. I. Tanaka, Residue Arithmetic and its Applications to

Computer Technology, McGraw-Hill, 1967.

248. H. C. A. van Tilborg, An Introduction to Cryptography, Kluwer Academic Publishers, 1988.

249. I. Vardi, Computational Recreations in Mathematica, Addison-Wesley, 1991. 250. M. Waldschmidt, P. Moussa, J. M. Luck and C. Itzykson, From Number The­

ory to Physics, Springer-Verlag, 1992.

251. S. Wagon, "Primality Testing", The Mathematical Intelligencer, 8, 3(1986), 58-61.

252. D. Welsh, Codes and Cryptography, Oxford University Press, 1989. 253. H. Wiener, "Cryptanalysis of Short RSA Secret Exponents", IEEE Transac­

tions on Information Theory, 36, 3(1990), 553-558.

254. A. Wiles, "Modular Elliptic Curves and Fermat's Last Theorem", Annals of Mathematics, 141 (1995), 443-551.

Bibliography 427

255. H. C. Williams, "The Influence of Computers in the Development of Number Theory", Computers & Mathematics with Applications, 8, 2(1982), 75-93.

256. H. C. Williams, "Factoring on a Computer", Mathematical Intelligencer, 6, 3(1984), 29-36.

257. H. C. Williams, Edouard Lucas and Primality Testing, John Wiley & Sons, 1998.

258. C. P. Williams and S. H. Clearwater, Explorations in Quantum Computation, The Electronic Library of Science (TELOS), Springer-Verlag, 1998.

259. H. Woll, "Reductions Among Number Theoretic Problems", Information and Computation, 72 (1987), 167-179.

260. S. Y. Yan, "Primality Testing of Large Numbers in Maple", Computers & Mathematics with Applications, 29, 12(1995), 1-8.

261. S. Y. Yan, Perfect, Amicable and Sociable Numbers- A Computational Ap­proach, World Scientific, 1996.

262. S. Y. Yan, An Introduction to Formal Languages and Machine Computation, World Scientific, 1998.

263. J. Young, "Large Primes and Fermat Factors", Mathematics of Computation, 67 (1998), 1735-1738.

264. R. Yuan and W. T. Strayer, Virtual Private Networks - Technologies and Solutions, Addison-Wesley, 2001.

265. K. C. Zeng, C. H. Yang, D. Y. Wei and T. R. N. Rao, "Pseudorandom Bit Generators in Stream-Cipher Cryptography", Computer, 24, 2(1991), 8-17.

Index

(k, n)-threshold scheme, 399 R(x), 103 EXP, 182 NP, 182 NP-complete, 187 NP-hard, 187 P, 182 A(n), 92 >.(n), 81 p,(n), 82 cf;(n), 79 7r, 176 1r(x), 86 1r2(x), 106 7r.w(x), 36 7./J(x), 92 cr(n), 66 T(n), 66 B(x), 90 ((s), 95 b-sequence, 209 kth (higher) power nonresidue, 157 kth (higher) power residue, 157 kth power nonresidue, 135 kth power residue, 135 nth prime, 105 s(n), 66 NP-SPACE, 184 P-SPACE, 184 Li(x), 94

Abel, K H., 16 adder, 316 additive group, 16 additive identity, 19 additive inverse, 19 additivity, 6 Adleman, L., 358 Advanced Encryption Standard (AES),

347 affine transformation, 337

Al-Khwarizmi, 177 algebraic computation law, 164 algebraic equation, 54 algebraic numbers, 15 algorithm, 23, 177 aliquot k-cycle, 71 alphabet, 183 amicable k-tuple, 71 amicable pair, 71, 176, 292 amicable triple, 71 APR test, 226 APRCL test, 226 arithmetic function, 63 arithmetic mean, 70 arithmetic progression of primes, 110,

176 associativity, 16 asymmetric cryptosystems, 333 asymmetric key cryptosystem, 351 Atkin, A. 0. L., 223 authentication, 332

base-2 pseudoprimality test, 208 basis vector, 274 Bernoulli's number, 96 binary computers, 312 binary Goldbach conjecture, 8, 295 binary operation, 15 bit operation, 191 block cipher, 338 Brent, R. P., 248 I3run's constant, 108

Caesar cipher, 336 Caesar, .J., 336 Carmichael number, 207 Carmichael's >.-function, 81, 127 Carmichael's theorem, 127 Carmichael, R. D., 81 CFRAC factoring algorithm, 239 CFRAC method, 237

430

Ch'in Chiu-Shao, 112, 130 character cipher, 335 Chebyshev's function, 90 Chebyshev, P. 1., 90 check digit, 322 Chen, J. R., 9, 109 Chinese Remainder Theorem (CRT),

130, 395, 399 Chinese test, 208 Church, A., 180 Church-Turing thesis, 180 ciphertext space, 333 closure, 15 Cocks, C. C., 350 coin-tossing states, 179 collision resistant, 321 combined test, 218 common multiple, 31 commutative group, 16 commutative ring, 18 commutativity, 16 complement, 183 complete quotients, 51 complete system of residues, 115 completely multiplicative function, 64 complex numbers, 15 complex zeros, 98 complexity classes, 183 composite Fermat numbers, 36 composite number, 24 computable, 178 computation, 180 computationally intractable (or

infeasible), 185 computationally tractable (or feasible),

185 congruence, 111 congruence classes, 113 congruent, 112 consecutive pairs of quadratic residues,

136 consecutive triples of quadratic

residues, 137 continued fraction, 44 Continued FRACtion (CFRAC)

method, 230 convergent, 45 convergents, 55 Converse of Fermat's little theorem,

126 Converse of Wilson's theorem, 128 Cook, S., 186 Cook-Karp Thesis, 186

covered writing, 409 cryptanalysis, 332 cryptographic tunnels, 404 cryptography, 332 cryptology, 332 cubic Diophantine equation, 160 cyclic group, 17

Index

Data Encryption Standard (DES), 344, 367

database decryption, 397 database encryption, 396 database security, 395 De Ia Vallee-Poussin, C . .J., 91 decidable, 178 decision problem, 183 decryption key, 333 decryption process (algorithm), 333 deterministic encryption, 373 Deutsch, D., 273 Dickson, L. E., 303 Diffie, W., 348 Diffie-Hellman-Merkle key-exchange,

354 Digital Signature Algorithm (DSA),

392 Digital Signature Standard (DSS), 392 digital signatures, 385 Diophantine equation, 53 Diophantus, 52 Dirac, P. A. M., 274 Dirichlet characters, 102 Dirichlet L-functions, 102 Dirichlet series, 102 Dirichlet, J. P. G. L., 101 discrete exponential bit generator, 331 discrete exponential generator, 330 discrete logarithm, 156 discrete logarithm problem, 254, 353 Disquisitiones Arithmeticae, 111 dividend, 23 divisibility, 21 division algorithm, 23 division ring, 18 divisor, 21 domain, 63 double encryption, 346 double hash, 318

ECPP (Elliptic Curve Primality Proving), 223

ECPP Algorithm, 224 effective procedure, 177

Index

efficient (good) algorithm, 184 electronic commerce, 405 ElGamal cryptosystem, 356 elliptic curve, 160, 379 elliptic curve analogue of Diffie

Hellman, 381 elliptic curve analogue of ElGamal, 382 elliptic curve analogue of Massey

Omura, 381 elliptic curve analogue of RSA, 382 elliptic curve bit generator, 331 elliptic curve cryptography (ECC), 379 Elliptic Curve Digital Signature

Algorithm (ECDSA), 394 elliptic curve discrete logarithm

problem (ECDLP), 266 elliptic curve test, 222 elliptic function, 162 elliptic integral, 162 Ellis, J. H., 350 embedded message, 409 embedding messages on elliptic curves,

380 encryption key, 333 encryption process (algorithm), 333 ENIGMA code, 333 equivalence classes, 113 equivalence relation, 113 Eratosthenes of Cyrene, 26 Erdiis, P., 93 error detection and correction, 321 Euclid, 2, 24 Euclid's algorithm, 40, 41 Euclid's Elements, 42 Euclid Euler Theorem, 72 Euler probable prime, 214 Euler pseudoprime, 214 Euler's (totient) ¢-function, 79 Euler's criterion, 139 Euler's pseudoprimality test, 214 Euler's rule for amicable pairs, 77 Euler's theorem, 126 Euler, L., 77 even number, 24 exclusive or (XOR), 344 exponential complexity, 193 exponentially bounded, 182 exponentially solvable, 182 extended Euclid's algorithm, 122

factor, 21 factoring by trial divisions, 232 fast group operations, 199

fast modular exponentiations, 196 fast point additions, 199 Federal Information Processing

Standard, 344 Fermat numbers, 36, 175 Fermat probable prime, 206 Fermat pseudoprime, 206 Fermat's factoring algorithm, 234 Fermat's Last Theorem (FLT), 12 Fermat's little theorem, 125 Fermat's pseudoprimality test, 206 Fermat, P., 12 Feynman, R. P., 273 Fibonacci numbers, 216 Fibonacci, L. P., 216 field, 18 finite fields, 20 finite group, 16

431

finite order of a point on an elliptic curve, 168

finite simple continued fraction, 46 FIPS 186, 392 FIPS 46, 344 FIPS 46-2, 344 FIPS 46-3, 344 firewall, 403 fixed-base number systems, 305 fixed-point attack, 372 Fundamental Theorem of Arithmetic,

28, 305

Galileo spacecraft, 325 Galois field, 20 Galois, E, 20 Gauss's lemma, 141 Gauss, C. F., 89 Generalized Riemann Hypothesis, 102 generating function, 102 geometric composition law, 164 geometric mean, 68 Goldbach partition, 10 Goldbach's conjecture, 6, 176, 295 Goldwasser, S., 222 greatest common divisor (gcd), 29 group, 15 group laws on elliptic curves, 168

Hadamard, J., 91 halting problem, 181 Hardy, G. H., 8 Hardy-Rarnanujan taxi number, 10 harmonic mean, 70 hash function, 317

432

Hasse, H, 169 height of a point, 166 Hellman, M. E., 348 high-order congruence, 133 Hilbert space, 274 hybrid cryptosystem, 354

identity, 16 incongruent, 112 index calculus, 262 index of a to the base g, 156 index of an integer modulo n, 155 inefficient (bad) algorithm), 184 infinite fields, 20 infinite group, 16 infinite order of a point on an elliptic

curve, 168 infinite simple continued fraction, 48 instantaneous description (ID), 180 integer, 14 integer factorization problem, 228, 352 integral domain, 18 International Standard Book Number

(ISBN), 322 Internet, 403 inverse, 16 invertible function, 352 irrational number, 15 irrational numbers, 48 isomorphic, 309 isomorphism, 309

Jacobi symbol, 147 Jacobi, C. G., 147

Karp, R., 186 key bundle, 346 key space, 333 Kilian, J., 222 Knuth, D. E., 229 Koblitz, N, 379 Kronecker, L., 14

Lagarias, J. C., 288 Landau, E., 8 language, 183 least (nonnegative) residue of x modulo

n, 114 least common multiple (icm), 31 least nonnegative residue, 112 least residue, 141 Legendre symbol, 139 Legendre's congruence, 234 Legendre, A. M., 89, 139

Lehman's method, 229 Lehmer, D. H., 218 Lenstra's Elliptic Curve Method

(ECM), 230, 251 Lenstra, H. W. Jr., 251 linear congruence, 123

Index

linear Congruential generator, 327 linear Diophantine equation, 54 Littlewood, J. E., 8 logarithm, 189 logarithmic integral, 94 Lucas numbers, 216 Lucas probable prime, 217 Lucas pseudoprimality test, 218 Lucas pseudoprime, 217 Lucas sequences, 215 Lucas test, 217 Lucas theorem, 217 Lucas, F. E., 215 Lucas-Lehmer test, 218 Lucas-Lehmer theorem, 219 Lucas-Lehmer test for Mersenne

primes, 220

Mobius JL-function, 82 Mobius inversion formula, 83 Mobius, A. F., 82 magnitude, 315 Massey-Omura cryptosystem, 357 Meissel, D. F. E., 287 Menezes, A. J., 383 Merkle, R. C., 349 Mersenne number, 33 Mersenne primes, 34, 175 Mersenne, M., 33 Mertens's conjecture, 78 message concealing, 410 message digest, 321, 392 message extracting, 410 message space, 333 middle-square method, 326 Miller, G., 210 Miller-Rabin test, 210 minimal perfect hash function, 320 minimal collision-free hash function,

320 mixed-base number systems, 305 modular arithmetic in Z/nZ, 118 modular exponentiation, 195 modular inverse, 120 modulus, 112 monographic cipher, 335 monoid, 16

Index

Morain, F., 223 Mordell, L. J., 170 multiple, 21 multiple encryption, 346 Multiple Polynomial Quadratic Sieve

(MPQS), 230 multiplicative function, 64 multiplicative generator, 328 multiplicative group, 16 multiplicative identity, 19 multiplicative inverse, 19, 120 multiplicativity, 5

National Institute of Standards and Technology (NIST), 344

natural numbers, 14 non-secret cover-message, 409 non-secret encryption, 351 non-zero field element, 19 noncomputable, 178 nonnegative integers, 14 nonpositional number systems, 305 nontrivial divisor, 22 nontrivial square root of 1, 209 nontrivial zeros, 98 nonwitness, 213 Number Field Sieve (NFS), 5, 230, 242,

265 number systems, 305

odd number, 24 odd perfect numbers, 175 Odlyzko, A. M., 78, 288 one's complement representation, 316 one-way function, 352 one-way hash function, 321 order of a modulo n, 151 order of a field, 20 order of a group, 17 order of a point on an elliptic curve,

168

packer filter, 403 parity, 2 parity check, 3, 321 parity check bit, 321 partial quotients, 45 Fell's equation, 57 perfect hash function, 320 perfect number, 71 period, 50 periodic simple continued fraction, 50 Pocklington's theorem, 222, 370 point at infinity, 161

433

polarization, 410 Pollard's p factoring algorithm, 248 Pollard's p-method, 230, 244 Pollard's "p- 1" factoring algorithm,

250 Pollard's "p- 1" method, 250 Pollard, J. M., 244 polygraphic cipher, 338 polynomial bounded, 182 polynomial complexity, 193 polynomial congruence, 133 polynomial congruential equation, 133 polynomial security, 373 polynomially solvable, 182 Pomerance, C., 240 positional number systems, 305 positive integers, 14 power generator, 329 practically feasible computation, 182 practically tractable computation, 182 primality, ,4 primality testing problem, 202 prime counting function, 86 prime distribution function, 86 prime factor, 27 prime factorization, 5 prime Fermat numbers, 36 prime number, 24 Prime Number Theorem, 88 prime numbers, 85 prime power, 20 prime power decomposition, 28 prime triples, 4 primitive root of n, 152 principle of superposition, 275 privacy, 332 private key, 352 probabilistic encryption, 373, 375 probabilistic Turing machine (PTM),

179 probable prime, 206 proper divisor, 21 pseudoprime, 206 pseudorandom numbers, 326 public key, 352 public-key cryptography, 333 public-key cryptosystem, 354 purely periodic simple continued

fraction, 50 Pythagoras, 76

quadratic congruence, 134 quadratic Diophantine equation, 57

434

quadratic irrational, 50 quadratic nonresidue, 135 quadratic nonresidue modulo n, 353 Quadratic reciprocity law, 144 quadratic residue, 135 quadratic residue modulo n, 353 quadratic residues generator, 330 Quadratic Residuosity Problem (QRP),

353, 374 Quadratic Sieve (QS), 240 quantum algorithm for discrete

logarithms, 285 quantum algorithm for integer

factorization, 282 quantum bit, 274 quantum computer, 274, 276 quantum cryptography, 410 quantum operation, 277 quantum register, 276, 282 quantum state, 274 quantum Turing machine (QTM), 278 qubit, 278 quotient, 23

Rabin's modified bit generator, 331 Rabin, M. 0., 210 Ramanujan, S., 10 random number generation, 326 random numbers, 326 randomized encryption, 373 rank of an elliptic curve, 171 rational numbers, 15, 46 read-keys, 396 real number, 50 real numbers, 15 real zeros, 98 real-valued function, 63 realbase logarithm, 155 rectilinear polarization, 410 reduced system of residues modulo n,

117 reflexive, 113 relatively prime, 30 remainder, 23 repeated doubling and addition, 199 repeated doubling method, 380 repeated multiplication, 195 repeated squaring, 195 repeated squaring and multiplication,

195 residue, 112 residue arithmetic in (Z/nZt, 311 residue class, 113

residue classes, 113 residue classes modulo n, 15 residue computers, 313 residue number systems, 305, 312 residue of x modulo n, 113

Index

residue representation of a number, 306 Riemann (-function, 95 Riemann function, 103 Riemann Hypothesis (RH), 98, 176 Riemann, G. F. B, 91, 95 ring, 17 ring with identity, 18 Rivest, R. L., 358 root finding problem, 271, 372 RSA Assumption, 358 RSA bit generator, 331 RSA cryptosystem, 358 RSA generator, 329 running time, 182

secret key, 333, 352 secret sharing, 399 secret-key cryptography, 333 secret-key cryptosystem, 354 Selberg's estimate, 92 Selberg, A., 92 Selfridge, J. L., 210 semantic security, 373 semigroup, 16 seminumerical method, 293 Sharnir, A., 358 Shanks' baby-step giant-step method

for discrete logarithms, 256 Shanks' class group method, 229 Shanks' SQ"GFOF method, 229 Shanks, D., 255 Shannon bits, 274 Shannon, C. E., 190 shift transformation, 337 Shor, P., 281 Sieve of Eratosthenes, 26 sign bit, 315 signature generation, 392 signature verification, 392 signed-magnitude representation, 315 Silver-Pohlig-Hellman algorithm, 258 simple continued fraction, 45 sociable group, 71 Solovay, R., 226 Solovay-Strassen test, 214 solvable, 178 square generator, 330 square root method, 258

Index

standard prime factorization, 28 steganographic system, 410 steganography, 409 stego-key, 409 stego-message, 409 Strassen, V., 226 strong probable prime, 210 strong pseudoprimality test, 208, 210 strong pseudoprime, 210 strong test, 208 subexponential complexity, 231 subgroup, 17 substitution eipher, 335 summatory function of 1l(n), 92 Sun Zi, 130 superposition, 277 symmetric, 113 symmetric: cryptosystcms, 333

Taylor, R., 12 te Riele's rule, 78 te Riele, H . .J . .J., 78 ternary Goldbach eonjecture, 8, 295 Thabit ibn Qurra, 74 Thabit's rule for amicable pairs, 75 time complexity function, 182 torsion subgroup, 171 transcendental numbers, 15 transitive, 113 trapdoor, 352 trapdoor one-way funetion, 352 trial division, 230

Triple DES (TDES), 346 trivial divisor, 22 trivial zeros, 98 Tukey, .J. W., 282 Turing machine, 178 Turing, A. M., 178 Twin Prime Conjecture, 109 twin primes, 4, 85

435

two's eomplement representation, 316

U.S. National Institute of Standards and Technology (NIST), 392

undeeidable, 178 unsolvable, 178

Vanstone, S. A., 383 Vinogradov, I. M., 9 Virtual Private ::-.Ietworks, 405 von Mangoldt funetion, 92 von Xeumann, .J., 326

Waring's problem, 176 Wiener's attack, 372 Wiles, A. J., 11, 12 Williamson, M. J., 351 Wilson's theorem, 128 Wilson, J., 128 witness, 213 words, 315 write-keys, 396

xcdni calculus, 267